{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:56:14Z","timestamp":1725580574976},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642209970"},{"type":"electronic","value":"9783642209987"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20998-7_23","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T11:33:10Z","timestamp":1302262390000},"page":"180-190","source":"Crossref","is-referenced-by-count":2,"title":["The Feasibility Study of Attacker Localization in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Young-Joo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sejun","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"ITU-T: Distributed Computing: Utilities, Grids & Clouds. ITU-T Technology Watch Reports, International Telecommunication Union (2009)"},{"issue":"8","key":"23_CR2","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"L. Akyildiz","year":"2002","unstructured":"Akyildiz, L., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"Communications Magazine"},{"issue":"5","key":"23_CR3","first-page":"774","volume":"5","author":"M. Kuorilehto","year":"2005","unstructured":"Kuorilehto, M., Hannikainen, M., Hamalainen, T.: A Survey of Application Distribution in Wireless Sensor Networks. EURASIP Journal on Wireless Communications and Networking\u00a05(5), 774\u2013788 (2005)","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"12","key":"23_CR4","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J. Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks: Int\u2019l Journal of Computer and Telecommunications Networking (ACM)\u00a052(12), 2292\u20132330 (2008)","journal-title":"Computer Networks: Int\u2019l Journal of Computer and Telecommunications Networking (ACM)"},{"issue":"10","key":"23_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A. Wood","year":"2002","unstructured":"Wood, A., Stankovic, J.: Denial of Service in Sensor Networks. Computer\u00a035(10), 54\u201362 (2002)","journal-title":"Computer"},{"key":"23_CR6","first-page":"74","volume-title":"Pervasive Computing","author":"D. Raymond","year":"2008","unstructured":"Raymond, D., Midkiff, S.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. In: Pervasive Computing, pp. 74\u201381. IEEE, Los Alamitos (2008)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Xu, W., et al.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: MobiHoc 2005: Proc. 6th ACM Int\u2019l. Symp. Mobile Ad Hoc Net. and Comp., pp. 46\u201357 (2005)","DOI":"10.1145\/1062689.1062697"},{"key":"23_CR8","unstructured":"Law, Y., et al.: Link-Layer Jamming Attacks on S-Mac. In: Proc. 2nd Euro. Wksp. Wireless Sensor Networks, pp. 217\u2013225 (2005)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming Sensor Networks: Attack and Defenses Strategies: IEEE Network, 41\u201347 (2006)","DOI":"10.1109\/MNET.2006.1637931"},{"key":"23_CR10","first-page":"97","volume-title":"Proc. of the First European Conference on Computer Network Defence (EC2ND 2005)","author":"S. Han","year":"2005","unstructured":"Han, S., Chang, E., Gao, L., Dillon, T.: Taxonomy of Attacks on Wireless Sensor Networks. In: Proc. of the First European Conference on Computer Network Defence (EC2ND 2005), pp. 97\u2013105. Springer, Heidelberg (2005)"},{"key":"23_CR11","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1109\/EUC.2010.121","volume-title":"IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing","author":"P. Reindl","year":"2010","unstructured":"Reindl, P., Nygard, K., Du, X.: Defending Malicious Collision Attacks in Wireless Sensor Networks. In: IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 771\u2013776. IEEE, Los Alamitos (2010)"},{"key":"23_CR12","first-page":"16","volume-title":"Proc. of Computational Intelligence in Miulti-criteria Decision-making","author":"R. Kulkarni","year":"2009","unstructured":"Kulkarni, R., Venayagamoorthy, G., Thakur, A., Madria, S.: Generalized Neuron Based Secure Media Access Control Protocol for Wireless Sensor Networks. In: Proc. of Computational Intelligence in Miulti-criteria Decision-making, pp. 16\u201322. IEEE, Los Alamitos (2009)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"CERT Coordination Center: Smurf IP denial-of-service attacks. Technical report, CERT Advisory CA-98:01 (1998)","DOI":"10.1016\/S1353-4858(98)90152-0"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/BFb0028465","volume-title":"Information and Communications Security","author":"T. Aura","year":"1997","unstructured":"Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 87\u201397. Springer, Heidelberg (1997)"},{"key":"23_CR15","first-page":"23","volume":"11","author":"V. Singh","year":"2010","unstructured":"Singh, V., Jain, S., Singhai, J.: Hello Flood Attack and its Countermeasures in Wireless Sensor Networks. International Journal of Computer Science Issues\u00a011, 23\u201327 (2010)","journal-title":"International Journal of Computer Science Issues"},{"issue":"6","key":"23_CR16","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"W. Perrig","year":"2004","unstructured":"Perrig, W., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communication of the ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Communication of the ACM"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Hu, N., Smith, R., Bradford, P.: Security for fixed sensor networks. In: ACM Southeast Regional Conference, pp. 212\u2013213 (2004)","DOI":"10.1145\/986537.986586"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: Proc. of ACM Sym. on Mobile Ad Hoe Networking and Computing, pp. 34\u201345 (2005)","DOI":"10.1145\/1062689.1062696"},{"key":"23_CR19","first-page":"91","volume-title":"Proc. International Symposium on Information Processing in Sensor Networks","author":"Z. Li","year":"2005","unstructured":"Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust Statistical Methods for Securing Wireless Localization in Sensor Networks. In: Proc. International Symposium on Information Processing in Sensor Networks, pp. 91\u201398. IEEE, Los Alamitos (2005)"},{"key":"23_CR20","volume-title":"Proc. of the 19th IEEE International Parallel and Distributed Processing Symposium","author":"S. Olariu","year":"2005","unstructured":"Olariu, S., Xu, Q.: Information assurance in wireless sensor networks. In: Proc. of the 19th IEEE International Parallel and Distributed Processing Symposium. IEEE, Los Alamitos (2005)"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1145\/1593105.1593227","volume-title":"Proc. of the 46th Annual Southeast Regional Conference (ACM-SE 2008)","author":"J. Engstrom","year":"2008","unstructured":"Engstrom, J., Gray, C.: Clear Channel Assessment in Wireless Sensor Networks. In: Proc. of the 46th Annual Southeast Regional Conference (ACM-SE 2008), pp. 464\u2013468. ACM, New York (2008)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Ramachandran, I., Roy, S.: Clear Channel Assessment in Energy-Constrained Wideband Wireless Networks. IEEE Wireless Communications, 70\u201378 (2007)","DOI":"10.1109\/MWC.2007.386615"},{"key":"23_CR23","first-page":"1","volume-title":"Proc. of Global Telecommunications Conference","author":"I. Ramachandran","year":"2006","unstructured":"Ramachandran, I., Roy, S.: On the Impact of Clear Channel Assessment on MAC Performance. In: Proc. of Global Telecommunications Conference, pp. 1\u20135. IEEE, Los Alamitos (2006)"},{"key":"23_CR24","unstructured":"Culler, D.: TinyOS: Operating System Design for Wireless Sensor Networks. Sensors (2006)"}],"container-title":["Communications in Computer and Information Science","Ubiquitous Computing and Multimedia Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20998-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T05:46:01Z","timestamp":1686030361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20998-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642209970","9783642209987"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20998-7_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}